Hacked RAM

Here we will make a duplicate of the Routine Locations section, although we will insert ASM hack routines so that we know what sections have code, what code doesn't account for load delay, and what hacks conflict with other hacks.